Threshold public key cryptosystem for encrypting long messages

被引:0
|
作者
Yang, Guang [1 ]
Liu, Jiqiang [1 ]
机构
[1] Computer and Information Technology Department, Beijing Jiaotong University, Beijing
来源
Journal of Computational Information Systems | 2015年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
Computational Diffie-Hellman problem; Long messages; Semantic security; Threshold cryptosystem;
D O I
10.12733/jcis13082
中图分类号
学科分类号
摘要
In this paper, we give two schemes of threshold public key cryptosystem for encrypting long messages. Both of our cryptosystems are highly efficient: for each participant, the first scheme in semi-honest model only needs a modular exponentiation operation and the second scheme needs three modular exponentiation operations. Furthermore, we give a variant of definition of semantic security for encrypting long messages to show that our cryptosystem is semantically secure if the CDH assumption holds. 1553-9105/Copyright © 2015 Binary Information Press
引用
收藏
页码:671 / 681
页数:10
相关论文
共 43 条
  • [31] A new fully homomorphic encryption over the integers using smaller public key
    Ramaiah, Yeluripati Govindha
    Kumari, Gunta Vijaya
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 303 - 331
  • [32] Trapdoor permutation polynomials of Z/nZ and public key cryptosystems (Extended abstract)
    Castagnos, Guilhem
    Vergnaud, Damien
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 333 - +
  • [33] Constructing pairing-free certificateless public key encryption with keyword search
    Lu, Yang
    Li, Ji-guo
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (08) : 1049 - 1060
  • [34] Semantic Secure Public Key Encryption with Filtered Equality Test PKE-FET
    Huang, Kaibin
    Chen, Yu-Chi
    Tso, Raylin
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 327 - 334
  • [35] Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
    Xu, Peng
    Wu, Qianhong
    Wang, Wei
    Susilo, Willy
    Domingo-Ferrer, Josep
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1993 - 2006
  • [36] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (01): : 3 - 8
  • [37] An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems
    Tripathi, Shailendra Kumar
    Gupta, Bhupendra
    Pandian, K. K. Soundra
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 164
  • [38] Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
    Xu, Peng
    He, Shuanghong
    Wang, Wei
    Susilo, Willy
    Jin, Hai
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3712 - 3723
  • [39] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (04): : 303 - 308
  • [40] Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT
    Xu, Peng
    Tang, Xiaolan
    Wang, Wei
    Jin, Hai
    Yang, Laurence T.
    IEEE ACCESS, 2017, 5 : 24775 - 24784